Transcript Document
Internet Ethics
Presented by:
Daniel Wu
Kalven Wu
Book Format
Internet Ethics edited by Duncan
Langford
Compilation of works written by many
authors
Little opinions, mostly informational
Published in 2000
Relation to Report
Report - Laws and the Internet
Copyrights
Defamation
John Mawhood and Daniel Tysver
Presentation - Privacy and Security
Related to Everyday Use
Herman T. Tavani
Outline
What is Privacy?
Privacy Theories
Internet Enhanced Privacy Concerns
Internet Specific Privacy Concerns
Outline (cont.)
What is Security?
Two senses of Security
Cryptography and Data Encryption
Proposals for Internet Privacy and
Internet Security
What is Privacy?
Interest that individuals have with
respect to protecting personal
information, personal property, and
personal space
Moral or Legal right ?
Data Protection
Privacy Theories
Non-Intrusion theory
Seclusion theory
Control theory
Limitation theory
Control/Restricted Access theory
Non-Intrusion Theory
Article by Warren and Brandels (1890)
‘Being let alone’
‘Being free from intrusion’
Problem: could be left alone but still no
privacy.
Seclusion Theory
‘Being alone’
Physical means in a state of solitude
Differentiates Privacy with Liberty
Confused Privacy with Solitude
Person on a Deserted Island
Control Theory
One has Privacy iff one has control over
information about oneself
Choice – grant/deny access to info
All or None
Flaws
Practical – Never able to have complete control
over information about onself
Theoretical – Can reveal every bit of information
but still retain privacy
Limitation Theory
Limiting and restricting access of
information in certain contexts
Avoids confusion:
Autonomy
Liberty
Solitude
Problem: Underestimate role of control
Confused with secrecy
Control/Restricted Access
Theory
Privacy in a ‘situation’ if person is
‘protected from intrusion, interference,
and information access by others’
Comprehensive account
Situations
Activity, relationship, storage/access of
information
Internet Enhanced Privacy
Concern
Privacy Issues before the Internet
Dataveillance & Data Gathering
Data Exchanging and Data Mining
Dataveillance & Data
Gathering
Monitoring people’s actions or
communications
Not unique to Internet
Click streams
Direct
Wiretapping
Stalkers
Web forms
Indirect
Log files
Data Exchanging and Data
Mining
Sale of data to third parties
Merging and matching of electronic
records
Data mining
Unearth patterns and relationships
between data
Consumer groups
Internet Specific Privacy
Concern
Cookie
Search Engine
Cookie
Collect data
With or without user’s knowledge
Shopping cart
Able to turn off
Search Engine
Retrieving personal information
Information about Individual persons
Persons with no knowledge of information
on databases
Searching on listservers, newsgroups,
etc provides information about user
history
What is Security?
ECS153
Privacy concerns is losing control of
personal information to people who
claim to need it
Security concerns is fear of
unauthorized access and manipulation
of data by people who does not have a
legitimate need of it
Two senses of Security
Concerns involving computer system
vulnerability
Viruses, worms, and other ‘rogue’
programs
Protection from unauthorized access
information that either
Resides in databases
Communicated over the Internet
Cryptography and Data
Encryption
Prof. Rogaway studies cryptography
Plain text, ciphertext, key
Private Key
Roman Era: Julius Caesar
Public and Private Key, “Strong
encryption”
Proposals for Internet Privacy
and Internet Security
Anonymizer
Crowds
Onion Router
Final Remarks
Questions ?
Comments
Discussion